At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
REPRODUCING STATE OF SOURCE ENVIRONMENT WHEN IMAGE WAS SCREEN CAPTURED ON
A DIFFERENT COMPUTING DEVICE USING...
A method, system and computer program product for facilitating access to a resource represented in an image at a later time. A screen capture of an image...
NON-INTRUSIVE DEVICE DISCOVERY AND CONFIGURATION CLONING
Infrastructure management device(s) may discover IT device(s) communicatively connected over a network. IT device information may be determined for at least...
DISTRIBUTED CONFIGURATION MANAGEMENT IN A SWITCH GROUP
One embodiment of the present invention provides a switch. The switch includes a switch group module, a persistent storage module, and a distributed...
INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION
PROCESSING APPARATUS, AND RECORDING MEDIUM
An information processing apparatus includes a management unit configured to manage configuration information indicating a device configuration of the...
SERVICE PROVISIONING PROFILE FOR A FABRIC NETWORK
Methods and systems for pairing a device to an account managed by a remote service include connecting to a commissioning device. The commissioning device is a...
CONFIGURATION REPLICATION ACROSS DISTRIBUTED STORAGE SYSTEMS
A method includes receiving a change in a primary configuration of a primary storage node while the primary storage node is operational, wherein primary data...
Cloud-Based Virtual Machines and Offices
Cloud-based virtual machines and offices are provided herein. Methods may include establishing a cloud-based virtual office, by providing selections,...
HYBRID SERVICE FLEET MANAGEMENT FOR CLOUD PROVIDERS
A fleet manager within a cloud computing system utilizes a registration framework with one or more cloud infrastructure managers having corresponding...
DEPLOYING DISK IMAGES
The present invention extends to methods, systems, and computer program products for deploying disk images. Various common disk images can be examined (e.g.,...
CONFIGURATION OF NFC ROUTERS FOR P2P COMMUNICATION
A method for configuring a first device for a near-field communication with a second device, wherein a peer-to-peer mode is selected if the second device draws...
SYSTEM, APPARATUS AND METHODS FOR ADAPTIVE DATA TRANSPORT AND OPTIMIZATION
OF APPLICATION EXECUTION
Elements and processes used to enable the generation and interaction with complex networks, simulations, models, or environments. In some embodiments, this is...
MANAGEMENT SYSTEM AND INFORMATION PROCESSING METHOD
The present invention relates to a management system with a management agent program installed and communicable with a first information processing apparatus...
A Software Defined Networking (SDN) controller selects ports from among ports on an SDN edge device as selected ports of an aggregation group according to an...
Automatic Creation and Management of a Community of Things for Internet of
Things (IoT) Applications
Presented herein are techniques for automatically creating communities of network-connected devices, i.e., Internet of Thing (IoT) devices. One or more of a...
SYSTEM AND METHOD FOR SYNCHRONIZATION FOR OFDMA TRANSMISSION
In an example of wireless communications, an access point may send a downlink frame to multiple stations. The downlink frame may include information indicative...
De-Mapping Technique with Provision of Probability Information Including a
A technique for de-mapping a point in a constellation diagram into a bit sequence is presented. The de-mapping provides for each bit of the bit sequence an...
METHOD FOR COMMUNICATION VIA THREE ORTHOGONAL WAVEFORMS
Aspects of the present disclosure aim at providing three orthogonal waveforms that can be used for transmitting 3n bits (n bits from each waveform) at a given...
DETECTOR AND METHOD FOR DETECTING IQ SWAP
A detector and a method for detecting IQ swap are provided. The detector includes a first correlator, a second correlator and a comparator. The first...
TONE-PHASE-SHIFT KEYING: A NEW MODULATION SCHEME FOR SC-FDMA
A method of wireless communication by a user equipment includes determining an allocation of a set of tones in a symbol for conveying data. The method further...
Front-End Module And Coupling Compensation For Closed-Loop Digital
Examples of front-end modules, apparatuses and methods for coupling compensation in a closed-loop digital pre-distortion (DPD) system are described. The...
COEFFICIENT ERROR ROBUST FEED FORWARD EQUALIZER
The present invention relates to a coefficient error robust feed forward equalizer and, more specifically, to a feed forward equalizing transmitter for...
JOINT TRANSMITTER AND RECEIVER MAP ALGORITHM FOR ENHANCING FILTERING
TOLERANCE IN A BANDWIDTH-LIMITED SYSTEM
A system for optimizing signal quality in an optical communication system is provided including a transmitter for converting digital signals to optical...
Power Aware Receiver/Transmitter Adaptation for High Speed Serial
A receiver includes first and second equalization modules adapted to provide first and second compensations to a data signal, and a control module including a...
LINE DRIVER CIRCUIT AND METHOD
A driver circuit for driving a transmission line includes a voltage driver and a current driver. The voltage driver is for driving the transmission line with a...
RECEIVING APPARATUS AND EQUALIZATION PROCESSING METHOD
A communication processor of a receiving apparatus includes a channel matrix calculation unit, a noise power calculation unit, and an interference...
CHANNEL ESTIMATION METHOD AND RECEIVER
Embodiments of the present invention provide a channel estimation method and a receiver. The method includes: determining a channel space related matrix of...
Method and System for Controlling Internet of Things (IoT) Device
Provided is a method and system for controlling an Internet of Things (IoT) device. An IoT control method configured as a computer may include registering an...
ESTABLISHING A MULTICAST SIGNALING CONTROL CHANNEL BASED ON A MULTICAST
ADDRESS THAT IS RELATED TO FLOOR...
In an embodiment, a P2P device discovers other P2P devices that belong to a P2P group. The P2P device determines a multicast address to be used for signaling...
UNIVERSAL ANONYMOUS CROSS-SITE AUTHENTICATION
The device may receive user information associated with a user. The device may generate a user profile for the user that stores user information and...
CERTIFICATES FOR LOW-POWER OR LOW-MEMORY DEVICES
Methods and systems for generating or validating compact certificates include receiving a first format of the certificate. Moreover, obtain a signature for the...
CERTIFICATES FOR LOW-POWER OR LOW-MEMORY DEVICES
Compact certificate formats that may be used in a fabric or network between devices. The compact format includes a serial number field tagged with a tag of 1,...
DEVICE AND METHOD FOR TRACEABLE GROUP ENCRYPTION
A group encryption system comprising at least one group member device, a group manager device, an opening authority device, a sender device and a tracing agent...
METHOD AND SYSTEM FOR BACKING UP PRIVATE KEY OF ELECTRONIC SIGNATURE TOKEN
Provided are a method and system for backing up the private key of an electronic signature token, the method comprising: a first electronic signature token...
DERIVING CRYPTOGRAPHIC KEYS FROM BIOMETRIC PARAMETERS
One feature pertains to a biometric cryptographic technique that exploits synthetic fingerprints or other synthetic biometric information. In one aspect,...
DETECTION OF UNAUTHORIZED ENTITIES IN COMMUNICATION SYSTEMS
Methods and systems are provided for detection of unauthorized entities in communication systems. The method includes obtaining a secret string by a first...
SYSTEM AND METHOD FOR ROTATING CLIENT SECURITY KEYS
Systems, methods, and non-transitory computer-readable storage media for rotating security keys for an online synchronized content management system client. A...
KEY EXPANSION LOGIC USING DECRYPTION KEY PRIMITIVES
A secure memory, key expansion logic, and decryption logic are provided for a microprocessor that executes encrypted instructions. The secure memory stores a...
CHIP AND METHOD FOR OPERATING A PROCESSING CIRCUIT
According to one embodiment, a processing circuit is described including a first input path and a second input path, a processing element configured to receive...
Identifying Security Boundaries on Computing Devices
During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or...
DATA DISTRIBUTING OVER NETWORK TO USER DEVICES
A data device controls distribution of data to user devices through an edge router via an encryption scheme. The data device encrypts data using a first key...
KEY, SYSTEM AND METHOD OF UNLOCKING ELECTRONIC DEVICE USING THE KEY
A method for unlocking a display screen of an electronic device includes activating the display screen which is locked of the electronic device when receiving...
ENCRYPTED TEXT MATCHING SYSTEM, METHOD, AND COMPUTER READABLE MEDIUM
An encrypted text matching system includes: an auxiliary data generating unit that generates first and second auxiliary data, which are for verification of...
A cipher employs rotation of a substitution box (S-Box) value to provide both confusion and diffusion. In some aspects, for each iteration of an iterative...
SYSTEM AND METHOD FOR REMOTE CLOCK ESTIMATION FOR RELIABLE COMMUNICATIONS
An electronic device is provided including a processor, a communications interface coupled to the processor, a memory coupled to the processor, and a module...
WIRELESS NETWORK THROUGHPUT SYSTEM AND METHOD
Wireless network throughput system and method implementing ultra phase modulation (UPM). An example system includes a receiver, a transmitter, UPM modulator,...
METHOD FOR DRIVING SERDES CIRCUIT
Provided is a method for driving a SERDES circuit, which may reduce waste of a space of the SERDES circuit. The circuit driving method includes generating a...
Systems and Methods for Leak Suppression in a Full Duplex System
A system and method for leak suppression in a full duplex system is disclosed. In an embodiment, a system for wireless transmission and reception includes a...
Systems, Methods, and Devices for Allocating OFDMA Subchannels Without
Straddling Direct Current
Example systems, methods, and devices for reusing one or more architectural building blocks of IEEE 802.11 n/ac/ah network, and allocating one or more...
METHOD AND APPARATUS FOR TRANSMITTING ACK/NACK IN A TDD-BASED WIRELESS
A method of configuring a positive acknowledgement (ACK) or negative acknowledgement (NACK) in a wireless communication system based on time division duplex...
WIRELESS COMMUNICATION BASE STATION EQUIPMENT, WIRELESS COMMUNICATION
TERMINAL DEVICE AND SEARCH SPACE SETTING...
Disclosed is wireless communication base station equipment in which CCE allocation can be flexibly performed without collision of ACK/NACK signals between a...